Computer Networking On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses? /30 /29 /28 /27 /30 /29 /28 /27 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is considered to be the destination host before translation? Outside global Outside local Inside local Inside global Outside global Outside local Inside local Inside global ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? UDP SMTP None of these VMTP X.25 UDP SMTP None of these VMTP X.25 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking After you have verified that TCP/IP is installed correctly, what is the next step in verifying the TCP/IP configuration? Ping the Microsoft Web site Ping a distant router. Ping the broadcast address Ping the address of the local host None of these Ping the Microsoft Web site Ping a distant router. Ping the broadcast address Ping the address of the local host None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Your switch has a port status LED that is alternating between green and amber. What could this indicate? The port is shut down. The port is in STP blocking mode. Nothing; this is normal. The port is experiencing errors. The port is shut down. The port is in STP blocking mode. Nothing; this is normal. The port is experiencing errors. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can apply two access lists to any interface. You can place as many access lists as you want on any interface until you run out of memory. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply only one access list on any interface. You can apply two access lists to any interface. You can place as many access lists as you want on any interface until you run out of memory. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply only one access list on any interface. ANSWER DOWNLOAD EXAMIANS APP